Re: pass-through authentication and base64

2012-08-16 Thread sergio
On 08/16/2012 11:33 AM, Emmanuel Lécharny wrote: You have asked that openLDAP not to encode the UserPassword value, when OpenLDAP does *not* encode anything. Sorry, I should write slapcat or ldapsearch in the original letter. The value is *always* store in binary format. This is the LdapSea

Re: pass-through authentication and base64

2012-08-16 Thread sergio
On 08/16/2012 11:07 AM, Howard Chu wrote: *Ignorance* is inconvenient. What does any of this have to do with pass-through authentication? When slapd handles an authentication it uses the binary value. base64 has nothing to do with it. Under "pass-through authentication" I mean "magic tokens fo

Re: pass-through authentication and base64

2012-08-16 Thread Emmanuel Lécharny
Le 8/16/12 7:49 AM, sergio a écrit : On 08/15/2012 10:27 PM, Emmanuel Lécharny wrote: Then can you provide an example of base64 encoded value that we can evaluate ? May be you can provide an example which will show plain text password? What are you talking about ? You have asked that openL

Re: pass-through authentication and base64

2012-08-16 Thread Howard Chu
sergio wrote: >> I don't see any justification in the file for doing so, but the RFC >> says any value MAY be encoded. I think Michael's advice is very >> prudent. > > MAY be encoded, yes. This means that ldapsearch or slapcat can output > all values base-64 encoded. But it's very inconvenient. W

Re: pass-through authentication and base64

2012-08-15 Thread sergio
Hello, Wes. I'm not a programmer by any stretch of the imagination but it appears to me that the LDIF generator is hard-coded to always base64-encode the userPassword value. Yes, looks you're right. I don't see any justification in the file for doing so, but the RFC says any value MAY be en

Re: pass-through authentication and base64

2012-08-15 Thread sergio
On 08/15/2012 10:27 PM, Emmanuel Lécharny wrote: Then can you provide an example of base64 encoded value that we can evaluate ? May be you can provide an example which will show plain text password? -- sergio.

Fwd: pass-through authentication and base64

2012-08-15 Thread Brett Maxfield
> This decodes ok as > > {SASL}username@realm > > (omit the trailing ==, before decoding) > > So you mean to delegate auth to a sasl realm called 'realm', containing a > user called 'username' ? > > Have you literally added this example value to an ldap entry and dumped it > with slapcat ? >

Re: pass-through authentication and base64

2012-08-15 Thread Emmanuel Lécharny
Le 8/15/12 5:22 PM, sergio a écrit : On 08/15/2012 06:12 PM, Emmanuel Lécharny wrote: e1NBU0x9dXNlcm5hbWVAcmVhbG0K== ONCE AGAIN: This is my bad example. Real values in the database have no newline or some other non-ASCII non printable characters. It even can't be correctly decoded. Then can

Re: pass-through authentication and base64

2012-08-15 Thread Wes Hardin
On 08/15/2012 03:14 AM, sergio wrote: > On 08/15/2012 11:08 AM, Michael Ströder wrote: > >> If you want to process LDIF then be prepared to process any LDIF data >> compliant to RFC 2849. Period. > > RFC 2849 doesn't say any special about userPassword and why it should be > base64 encoded. I'm n

Re: pass-through authentication and base64

2012-08-15 Thread sergio
On 08/15/2012 06:12 PM, Emmanuel Lécharny wrote: e1NBU0x9dXNlcm5hbWVAcmVhbG0K== ONCE AGAIN: This is my bad example. Real values in the database have no newline or some other non-ASCII non printable characters. It even can't be correctly decoded. -- sergio.

Re: pass-through authentication and base64

2012-08-15 Thread Emmanuel Lécharny
Le 8/15/12 1:56 PM, sergio a écrit : On 08/15/2012 02:00 PM, Brett @Google wrote: If you are sure there is nothing but SAFE-CHAR, check for space or and non-ascii charset. I'm absolutely sure. Really ??? e1NBU0x9dXNlcm5hbWVAcmVhbG0K== decoded gives : 0x7B 0x53 0x41 0x53 0x4C 0x7D 0x75 0x

Re: pass-through authentication and base64

2012-08-15 Thread sergio
On 08/15/2012 02:00 PM, Brett @Google wrote: If you are sure there is nothing but SAFE-CHAR, check for space or and non-ascii charset. I'm absolutely sure. If I put same value to the title attribute I see it plaintext. And I'm absolutely sure that there are no any hidden or invalid characters.

Re: pass-through authentication and base64

2012-08-15 Thread Brett @Google
On Wed, Aug 15, 2012 at 3:14 PM, sergio wrote: > On 08/15/2012 11:08 AM, Michael Ströder wrote: > > If you want to process LDIF then be prepared to process any LDIF data >> compliant to RFC 2849. Period. >> > > RFC 2849 doesn't say any special about userPassword and why it should be > base64 enc

Re: pass-through authentication and base64

2012-08-15 Thread sergio
On 08/15/2012 11:08 AM, Michael Ströder wrote: If you want to process LDIF then be prepared to process any LDIF data compliant to RFC 2849. Period. RFC 2849 doesn't say any special about userPassword and why it should be base64 encoded. -- sergio.

Re: pass-through authentication and base64

2012-08-15 Thread Michael Ströder
sergio wrote: > On 08/15/2012 12:03 AM, Dan White wrote: > >>> userPassword:: e1NBU0x9dXNlcm5hbWVAcmVhbG0K== > >> Notice the double colons. > Yes, it shows that the value is base64 encoded. > >>> but I'd like to see: >>> userPassword:: {SASL}username@realm > >> Which would not exist here. > Thi

Re: pass-through authentication and base64

2012-08-14 Thread sergio
On 08/15/2012 12:03 AM, Dan White wrote: userPassword:: e1NBU0x9dXNlcm5hbWVAcmVhbG0K== Notice the double colons. Yes, it shows that the value is base64 encoded. but I'd like to see: userPassword:: {SASL}username@realm Which would not exist here. This is my mistake of course, I mean: us

Re: pass-through authentication and base64

2012-08-14 Thread Dan White
On 08/13/12 15:26 +0400, sergio wrote: Hello. Is it possible to ask openldap not to encode magic tokens for pass-through authentication? Now ldapsearch shows: userPassword:: e1NBU0x9dXNlcm5hbWVAcmVhbG0K== Notice the double colons. but I'd like to see: userPassword:: {SASL}username@realm

pass-through authentication and base64

2012-08-13 Thread sergio
Hello. Is it possible to ask openldap not to encode magic tokens for pass-through authentication? Now ldapsearch shows: userPassword:: e1NBU0x9dXNlcm5hbWVAcmVhbG0K== but I'd like to see: userPassword:: {SASL}username@realm instead. -- sergio.